scholarly journals Modified Lsb For Hiding Encrypted Kurdish Text Into Digital Image

2019 ◽  
Vol 7 (4) ◽  
pp. 254
Author(s):  
Nada E. Tawfiq

Image files can hide text without their size being affected too much. This process called steganography which allows hiding text in images without any suspicions from intruders. This paper addresses an improved LSB substitution algorithm for hiding Kurdish text information written in text file into digital image as steganography technique. The algorithm consists of two main phases, the first phase holds the encryption of the Kurdish text message and the embedded technique while the second phase hold the message extraction followed by decryption to get the original code of each character. The algorithm contains many procedures to enhance this process. Least Significant Bit method is used to hide the Kurdish text, in order to keep the features and characteristics of the original image. Applying the proposed approach shows that it seems work in a best case by hiding and retrieving text from the digital image which is used as a carrier of this text. Delphi 2010 was used to simulate both encrypt-embedded phase and extract-decrypt phase, and the results were obtained with high and security which proved the efficiency of the algorithm, where the hidden Kurdish text didn’t make any distortion or change over the cover image.

Author(s):  
Binay Kumar Pandey ◽  
Deepak Mane ◽  
Vinay Kumar Kumar Nassa ◽  
Digvijay Pandey ◽  
Shawni Dutta ◽  
...  

This work's primary goal is to secure the transmission of text hidden within the cover image using steganography over a public network of computers. Steganography is a powerful tool for concealing information within a cover image so that the concealed message remains undetectable. As a result, steganography refers to concealed writing. The secure transmission of information over a public network communication channel using steganography occurs in two stages, the first on the sender side and the second on the receiver side. In the first phase, steganography is normally applied to conceal the encrypted information within the image as a cover. The encrypted data is implanted inside the cover image using an improved least significant bit steganography method. The secret key obtained by the embedding algorithm is shared with the message retrieval algorithm on the receiver side to retrieve the message. Finally, the embedded text message is identified using a hybrid convolution regression adaptive integrated neural network (CRAINN) approach.


2018 ◽  
Author(s):  
Taronisokhi Zebua

There are several approaches to secure a data techniques that are still used by some circles among them by applying cryptographic techniques, steganography techniques, watermarks and other techniques. One technique that can be done to optimize the security of text data is to combine cryptographic techniques with steganography techniques. Cryptographic techniques serve to encrypt the text data is concealed through the process of encryption, while steganography techniques serve to hide (embedded) encrypted text data into a media such as images, video or audio. The algorithm of cryptographic techniques used in this case is the Cipher Block Chaining (CBC) algorithm invented by IBM in 1976 that implements a feedback mechanism on a block wherein the previous block will be fed back with the current block. The method used to hide encrypted messages on a medium is one of the modifications to the Least Significant Bit method, Least Significant Bit-1 (LSB-1). The LSB-1 algorithm works by replacing each of the 7th bits of the container medium with encrypted text bits. The collecting media (cover image) used in this case is a true color digital image.


2019 ◽  
Vol 5 (3) ◽  
pp. 255
Author(s):  
Garno Garno ◽  
Riza Ibnu Adam

Maraknya kasus pencurian data menyebabkan sistem keamanan pesan harus ditingkatkan. Salah satu cara untuk mengamankan pesan adalah dengan memasukkan pesan ke dalam gambar digital. Penelitian ini bertujuan untuk meningkatkan kualitas gambar digital dalam sistem keamanan pesan tersembunyi. Teknik yang digunakan untuk keamanan pesan adalah steganografi. Cover image akan dikonversi menjadi bit piksel dalam domain spasial. Cover image digunakan dalam bentuk gambar digital dengan format .jpg. Teknik meningkatkan kualitas dan kapasitas gambar digital dilakukan dengan menambahkan dan meningkatkan bit piksel menggunakan metode interpolasi Cubik B-Spline. Cover image yang telah di interpolasi, kemudian disisipi pesan menggunakan metode least significant bit (LSB) untuk memperoleh stegoimage. Pesan yang diselipkan berbentuk file .doc, .docx, .pdf, .xls, .rar, .iso dan .zip dengan ukuran berbeda-beda kapasitasnya. Teknik uji dibuat dengan bantuan perangkat lunak MATLAB versi 2017a. Penelitian melakukan uji dengan mengukur nilai kualitas penyamaran dari stegoimage menggunakan Peak Signal to Noise Ratio (PSNR) dengan rata-rata perolehan stegoimage terhadap Original image 29.06 dB dan stegoimage terhadap Image interpolation 64.34 dB dan uji mean squared error (MSE) dengan rata-rata perolehan 97.54 dB pada Image interpolation terhadap original image dan 97.55 dB pada stegoimage terhadap original image, 0.13 dB nilai MSE stegoimage terhadap Image interpolation. Hasil uji pada penelitian dengan proses interpolasi pada coverimage dengan Cubic B-Spline mempengaruhi terhadap nilai samar atau Nilai PSNR.


Author(s):  
Randi Rian Putra ◽  
Meika Sari ◽  
Andysah Putera Utama Siahaan ◽  
Muhammad Iqbal

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.


2020 ◽  
Vol 20 ◽  
pp. 17-22
Author(s):  
A. Lagun ◽  
O. Polotai

In the article has considered the peculiarities of steganographic algorithms implemenation for hiding information in inmoveable images. Authors has described different embedding algorithms which use the method of least significant bit. In particular, the use of digital filtering allows you to better select the necessary pixels for embedding, and the use of a pseudorandom sequence generator allows you to more effectively hide secret information, complicating the search for secret information to the attacker.From the existing color palettes to represent inmoveable images have been selected the most common RGB pal-ette, which contains red, green, and blue intensities to produce image pixels. Colors that are less sensitive to the human eye are used to form the filled steganographic containers to provide additional visual stability.Also, in the paper authors have investigated the features of hiding digital text information in a inmoveable image as a BMP file and have realized an algorithm that for images of different size allows you to hide a text file of the necessary size. In particular, the number of bytes of the secret message is written to the original container to retrieve the required number of characters during searching. In addition, it takes into account the peculiarities of forming a BMP file that contains additional alignment bytes of the string.In general, the algorithm allows you to select a container file of the appropriate size to hide the secret information, as well as the colors of the palette in which the information will be embedded. The extracting of secret information occurs until the number of bytes of the hidden message is reached. This value has recorded at the beginning of the hiding text. You can use encryption or compression algorithms to complication searching of clear text by attacker. Only users those who are aware of the algorithms used and perhaps the keys will be able to read the hidden information correctly.


2021 ◽  
Vol 21 (2) ◽  
pp. 89-104
Author(s):  
Dedi Darwis ◽  
Akmal Junaidi ◽  
Dewi Asiah Shofiana ◽  
Wamiliana

Abstract In this study we propose a new approach to tackle the cropping problem in steganography which is called Center Embedded Pixel Positioning (CEPP) which is based on Least Significant Bit (LSB) Matching by setting the secret image in the center of the cover image. The evaluation of the experiment indicated that the secret image can be retrieved by a maximum of total 40% sequential cropping on the left, right, up, and bottom of the cover image. The secret image also can be retrieved if the total asymmetric cropping area is 25% that covered two sides (either left-right, left-up or right-up). In addition, the secret image can also be retrieved if the total asymmetric cropping area is 70% if the bottom part is included. If asymmetric cropping area included three sides, then the algorithm fails to retrieve the secret image. For cropping in the botom the secret image can be extracted up to 70%.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The development of information technology today, makes it easier for perpetrators of computer crime, by abusing technology to support its activities, where their activities significantly disrupt someone's privacy. In this paper the insertion of text messages with the least significant bit method. Therefore the administrator needs a system or application that is safe so that it can make it difficult for computer criminals to carry out their activities, and help technology users regarding securing the accessed data bit, which is expected to increase the security of a secret text message. To increase the security of the data to be stored, the data stored is embedded in other media. Least Significant Bit is one method that can be used to hide confidential data on images or media. With this method, the confidentiality of information will be more secure.


2012 ◽  
Vol 546-547 ◽  
pp. 410-415
Author(s):  
Chun Ge Tang ◽  
Tie Sheng Fan ◽  
Lei Liu ◽  
Zhi Hui Li

A new blind digital watermarking algorithm based on the chain code is proposed. The chain code is obtained by the characteristics of the original image -the edge contour. The feather can reflect the overall correlation of the vector image, and chain code expression can significantly reduce the boundary representation of the amount of data required. For the watermarking embedding, the original vector image is divided into sub-block images, and two bits of the watermarking information are embedded into sub-block images repeatedly by quantization. For watermarking extracting, the majority decision method is employed to determine the size of the extracted watermark. Experimental results show that the image quality is not significantly lowered after watermarking. The algorithm can resist the basic conventional attacks and has good robustness on the shear attacks.


2021 ◽  
Vol 48 (4) ◽  
Author(s):  
Zainab N. Sultani ◽  
◽  
Ban N. Dhannoon ◽  

Hiding the presence of data during communication has become a pressing concern in this overly digitalized world as a consequence of illegitimate access. These concerns have led to cryptography and steganography techniques as methods for securing data. This paper presents a modified information hiding technique based on an indirect least significant bit. Instead of saving each bit of the secret message in the least significant bit (LSB) of the cover media, each bit of the secret message is compared to a mask bit in the cover media. The result is saved in the cover media’s LSB. In this paper, two steganography schemas are designed in which the cover media are image and audio, while the secret message is a text file. A simple encryption technique is used to transform the secret message into an unreadable format before the hiding process begins. The experimental results indicate that the proposed algorithm achieves promising performance


2013 ◽  
Vol 77 (13) ◽  
pp. 37-45 ◽  
Author(s):  
Ankit Chadha ◽  
Neha Satam ◽  
Rakshak Sood ◽  
Dattatray Bade

Sign in / Sign up

Export Citation Format

Share Document